it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
[IT-SecNots] [Security-news] Monster Menus - Critical - Arbitrary PHP code execution - SA-CONTRIB-2024-052
Chronologisch Thread
- From: security-news AT drupal.org
- To: security-news AT drupal.org
- Subject: [IT-SecNots] [Security-news] Monster Menus - Critical - Arbitrary PHP code execution - SA-CONTRIB-2024-052
- Date: Wed, 23 Oct 2024 16:59:50 +0000 (UTC)
- Authentication-results: lists.piratenpartei.de; dkim=pass header.d=drupal.org header.s=default header.b=aiyQkNc6; spf=pass (lists.piratenpartei.de: domain of security-news-bounces AT drupal.org designates 140.211.166.133 as permitted sender) smtp.mailfrom=security-news-bounces AT drupal.org; dmarc=pass (policy=none) header.from=drupal.org
- Dkim-filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org 05C794108C
- Dkim-filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org E2F6B40B03
- List-archive: <http://lists.drupal.org/pipermail/security-news/>
- List-id: <security-news.drupal.org>
View online: https://www.drupal.org/sa-contrib-2024-052
Project: Monster Menus [1]
Date: 2024-October-23
Security risk: *Critical* 19 ∕ 25
AC:Complex/A:None/CI:All/II:All/E:Theoretical/TD:All [2]
Vulnerability: Arbitrary PHP code execution
Affected versions: <9.3.4 || >=9.4.0 <9.4.2
Description:
This module enables you to group nodes within pages that have a
highly-granular, distributed permissions structure.
In certain cases the module doesn't sufficiently sanitize data before passing
it to PHP's unserialize() function, which can result in arbitrary code
execution.
Solution:
Install the latest version:
* If you use Monster Menus branch *9.4.x*, upgrade to monster_menus 9.4.2
[3]
* If you use Monster Menus branch *9.3.x*, upgrade to monster_menus 9.3.4
[4]
Reported By:
* Drew Webber [5] of the Drupal Security Team
Fixed By:
* Drew Webber [6] of the Drupal Security Team
* Dan Wilga [7]
Coordinated By:
* Greg Knaddison [8] of the Drupal Security Team
* Juraj Nemec [9] of the Drupal Security Team
* Drew Webber [10] of the Drupal Security Team
[1] https://www.drupal.org/project/monster_menus
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/monster_menus/releases/9.4.2
[4] https://www.drupal.org/project/monster_menus/releases/9.3.4
[5] https://www.drupal.org/user/255969
[6] https://www.drupal.org/user/255969
[7] https://www.drupal.org/user/56892
[8] https://www.drupal.org/u/greggles
[9] https://www.drupal.org/u/poker10
[10] https://www.drupal.org/user/255969
_______________________________________________
Security-news mailing list
Security-news AT drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news
- [IT-SecNots] [Security-news] Monster Menus - Critical - Arbitrary PHP code execution - SA-CONTRIB-2024-052, security-news, 23.10.2024
Archiv bereitgestellt durch MHonArc 2.6.19+.